Forensic Detecting Tools on Data Breaches
Transcription
Forensic Detecting Tools on Data Breaches
‘‘Forensic Detecting Tools on Data Breaches’’ Pravin .S.Paupiah (BSC, Bsc (Hons), Msc, CEH, ECSA, CHFI) IT Security Consultant Lecturer Origin of the word Forensics The word forensic comes from Latin word “forensic”, meaning "before the forum" and referring to something "of, pertaining to, or used in a court of law." In today's term the word forensic usually refers to a method of obtaining criminal evidence for purposes of using in a court of law. (ref:URL: http://www.tech-faq.com/forensic-science.html) What is computer forensics? Computer investigation and analysis techniques that involve the identification, preservation, extraction, documentation, and interpretation of computer data to determine potential legal evidence. Example of Data breaches An employee discovered that it was possible to access current and former employee W-2 forms online via a Google search. The W-2 form contained employee name, Social Security number, address, earnings, and taxes paid for 2009 and 2010. The discovery was made on December 23 of 2011. (From Spotsylvania County Spotsylvania, Virginia) A woman alerted a local news station to a stash of improperly disposed information. Credit card applications, patient names, addresses, Social Security numbers, and possibly medical records were found sitting next to a dumpster in a parking lot. The paperwork came from multiple organizations. Among the organizations were two closed branches of Pure Med Spa and Brite Smile Brite Skin. (From : Pure Med Spa, Brite Smile Brite Skin Las Vegas, Nevada) A nurse was fired after accessing patient medical records without cause. The unauthorized access exposed patient vital signs, diagnoses, and treatment notes. Patient Social Security numbers may have also been exposed. The breach was uncovered in November during an audit. (From: Titus Regional Medical Center (TRMC) Mount Pleasant, Texas) Example of Data breaches A hacker or hackers outside of the US attempted to gain access to an OSU Internet server. Information on the server included names, medical record numbers, and dianoses of 30 patients who visited the pathology department between the late 1980s and 2004. A roster of students who had received training at the medical center in 2006 was also on the server. Officials do not believe that any personal information was taken during the attempt. A total of 30 patients and 150 students were notified. (From: Ohio State University Medical Center Columbus, Ohio) The first email dated 30 September 2011 was sent to both Respondent’s office email address and copied to her personal email address. The email contained attachment documents, namely 6 ‘chrono’ excel, containing payroll details for the month of August 2011 with employees’ names, salary, details of the calculated salary amount (NPF, PAYE), car allowances, overtimes, loans and transport. (From:Mauritius DPO website) Forensics in relation with data Type of data breaches : protection Sensitive information posted publicly on a website, mishandled or sent to the wrong party via email, fax or mail. Someone with legitimate access intentionally breaches information - such as an employee or contractor. Lost, discarded or stolen non-electronic records, such as paper documents Lost, discarded or stolen laptop, PDA, smartphone, portable memory device, CD, hard drive, data tape, etc Lost, discarded or stolen stationary electronic device such as a computer or server not designed for mobility. Electronic entry by an outside party, malware and spyware. Fraud involving debit and credit cards that is not accomplished via hacking. For example, skimming devices at pointof-service terminals. When we all the above had happened, then we forensic examiners come into picture to collate evidences and ultimately produce them in a court of law. Importance of Forensics tools to Law Culprit must not be able evade due to technological issues Hence when choosing a forensic tool for analysis of an evidence, a forensic expert must: Make sure that the tools is worldly recognise Impossible for the defense lawyer to challenge the report done by a tool chosen by the prosecuting body Importance of Forensics tools The purpose of digital forensic analysis tools is to accurately present all data at a layer of abstraction and format that can be effectively used by an investigator to identify evidence. Some interesting statistics No big surprise here; outsiders are still dominating the scene of corporate data theft. Organized criminals were up to their typical misdeeds and were behind the majority of breaches in 2011. Activist groups created their fair share of misery and mayhem last year as well—and they stole more data than any other group. Their entrance onto the stage also served to change the landscape somewhat with regard to the motivations behind breaches. While good old-fashioned greed and avarice were still the prime movers, ideological dissent and pleasure felt at someone else's misfortune took a more prominent role across the caseload. As one might expect with such a rise in external attackers, the proportion of insider incidents declined. WHO IS BEHIND DATA BREACHES? 98% stemmed from external agents 4% implicated internal employees <1% committed by business partners 58% of all data theft tied to activist groups (Source: http://www.verizonbusiness.com/resources/reports/rp_databreach-investigations-report-2012_en_xg.pdf) (contd) HOW DO BREACHES OCCUR? 81% utilized some form of hacking 69% incorporated malware 10% involved physical attacks 7% employed social tactics 5% resulted from privilege misuse Incidents involving hacking and malware were both up considerably last year, with hacking linked to almost all compromised records. This makes sense, as these threat actions remain the favored tools of external agents, who, as described above, were behind most breaches. Many attacks continue to bypass authentication by combining stolen or guessed credentials (to gain access) with backdoors (to retain access). Social tactics fell a little, but were responsible for a large amount of data loss. (Source: http://www.verizonbusiness.com/resources/reports/rp_databreach-investigations-report-2012_en_xg.pdf) Forensic Tools A set of tools and/or software programs used to analyze a computer for collection of evidence. It can divided into: Proprietary/commercial tools Open source tools Proprietary/Commercial Tools Commercial / Proprietary tools are tools that ultimately have a cost associated to it. Commercial tools could be divided between - Hardware - Software Examples of Proprietary/Commercial Tools Visual TimeAnalyzer (contd) Evidor (contd) Prodiscover DFT (contd) ENCASE Hardware based Proprietary/Commercial Tools (contd) What are Open Source Tools Open source tools are tools that normally are available free of cost. Examples Open Source Tools CAINE (Computer Aided Investigative Environment) CAINE (Computer Aided INvestigative Environment) is an Italian digital forensic project CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims to guarantee are the following: an interoperable environment that supports the digital investigator during the four phases of the digital investigation a user friendly graphical interface a semi-automated compilation of the final report contd Autopsy / The Sleuth Kit The Autopsy Forensic Browser is a graphical interface to the digital investigation tools in The Sleuth Kit. Together, they allow you to investigate the file system and volumes of a computer. contd Cuckoo Sandbox Cuckoo Sandbox is a malware analysis system. Its goal is to provide you a way to automatically analyze files and collect comprehensive results describing and outlining what such files do while executed inside an isolated environment. It's mostly used to analyze Windows executables, DLL files, PDF documents, Office documents, PHP scripts, Python scripts, Internet URLs and almost anything else you can imagine. But it can do much more... It's up to you to discover what and how. Question Time [email protected] 255 3318